Latest revision |
Your text |
Line 7: |
Line 7: |
| |related= | | |related= |
| }} | | }} |
| {{Text-Specific Outline stub}}
| |
| ==INTRODUCTION==
| |
|
| |
| ===Purposes===
| |
|
| |
| ===Organization===
| |
|
| |
|
| |
| ==PROVIDING FOR THE “COMMON DEFENCE”: THE ORIGINAL UNDERSTANDING==
| |
|
| |
| ===The Constitutional Text===
| |
|
| |
| ===Pre-Constitutional History and Political Theory in Europe===
| |
|
| |
| ===The American Experience Prior to 1787===
| |
|
| |
|
| |
| ===The Framers’ View===
| |
|
| |
| ====The Convention====
| |
|
| |
| ====Ratification====
| |
|
| |
| ==THE PRESIDENT’S NATIONAL SECURITY POWERS==
| |
|
| |
|
| |
| ===The Spectrum of Presidential Power===
| |
|
| |
| ====When the President Acts Pursuant to Delegated Authority in Foreign Relations====
| |
|
| |
|
| |
| ====When the President Acts in the “Zone of Twilight” in Foreign Relations====
| |
|
| |
| ====When the President Takes Measures Incompatible with the Expressed or Implied Will of Congress in Foreign Relations====
| |
|
| |
| ===The Commander in Chief’s War Powers===
| |
|
| |
| ====Defensive War Power====
| |
|
| |
| ====Customary War Power====
| |
|
| |
| ====“Core” Presidential War Power and Statutory Limits====
| |
|
| |
|
| |
| ===The President’s Emergency Powers===
| |
|
| |
| ====The National Emergencies Act and Standby Emergency Legislation====
| |
|
| |
| ====Independent Executive Emergency Authority?====
| |
|
| |
| ==CONGRESS’S NATIONAL SECURITY POWERS==
| |
|
| |
| ===Congressional Authorizations for War===
| |
|
| |
|
| |
| ====Formal Declaration of War====
| |
|
| |
|
| |
| ====Authorizing War by Statute====
| |
|
| |
| ====Limiting War Power? The War Powers Resolution====
| |
|
| |
| =====The Recital of Presidential War Powers=====
| |
|
| |
| =====Consultation=====
| |
|
| |
| =====Triggers and the Reporting Requirements=====
| |
|
| |
| =====The 60-Day Clock=====
| |
|
| |
| =====The Concurrent Resolution=====
| |
|
| |
| =====The Rule of Construction=====
| |
|
| |
| ===Delegations and Appropriations for National Security===
| |
|
| |
| ====Delegations of National Security Authority====
| |
|
| |
| ====Implied Authorization by Defense Appropriation====
| |
|
| |
| ====Wielding the Appropriations Power====
| |
|
| |
|
| |
| ===Limitations on Congressional War Powers===
| |
|
| |
| ====The Nondelegation Principle====
| |
|
| |
| ====The Lovett Principle====
| |
|
| |
| ====The Chadha Principle====
| |
|
| |
| ==THE COURTS’ NATIONAL SECURITY POWERS==
| |
|
| |
| ===The Federal Judicial Power Generally===
| |
|
| |
| ===A Self-Defining Role for Courts: The Justiciability Doctrines===
| |
|
| |
| ====Standing to Sue====
| |
|
| |
| ====The Political Question Doctrine====
| |
|
| |
|
| |
| ====Ripeness====
| |
|
| |
|
| |
| ===Substantive Hurdles: Bivens and Qualified Immunity===
| |
|
| |
|
| |
| ====A Cause of Action?====
| |
|
| |
|
| |
| ====Qualified Immunity====
| |
|
| |
| ===Evidentiary Hurdles: The State Secrets Privilege===
| |
|
| |
|
| |
| ==THE DOMESTIC EFFECT OF INTERNATIONAL LAW==
| |
| ===The Making and Interpretation of Treaties===
| |
|
| |
| ===Executive and Other Agreements===
| |
|
| |
|
| |
|
| |
| ===The Domestic Legal Effect of Treaties and Executive Agreements===
| |
|
| |
| ===Statutory Incorporation of International Law===
| |
|
| |
|
| |
|
| |
| ===The Domestic Legal Effect of Customary International Law and ''Jus Cogens''===
| |
|
| |
| ==THE EXTRATERRITORIAL REACH OF U.S. LAW”==
| |
|
| |
| ===Extraterritorial Reach of Constitutional Rights===
| |
|
| |
|
| |
| ===Extraterritorial Effect of U.S. Statutes===
| |
|
| |
|
| |
| ==THE RIGHT TO WAGE WAR (''JUS AD BELLUM'')==
| |
|
| |
|
| |
| ===Law Regarding Resort to the Use of Force: The Basic Elements===
| |
|
| |
|
| |
| ===Content of ''Jus ad Bellum''===
| |
|
| |
|
| |
| ==INTERNATIONAL HUMANITARIAN LAW (''JUS IN BELLO'')==
| |
|
| |
| ===Authorities for ''Jus in Bello''===
| |
|
| |
|
| |
| ===Applying IHL — Conflict Classification and Combatant Immunity===
| |
|
| |
|
| |
|
| |
| ==HOW WE GO TO WAR: LESSONS FROM VIETNAM==
| |
|
| |
| ===Going to War in Vietnam===
| |
|
| |
|
| |
| ===Limiting the Scope of the Vietnam War===
| |
|
| |
|
| |
| ===Ending the Vietnam War===
| |
|
| |
|
| |
| ==COLLECTIVE USE OF FORCE==
| |
|
| |
| ===The Korean “Police Action”===
| |
|
| |
| ===The 1991 Persian Gulf War===
| |
|
| |
| ===Afghanistan===
| |
|
| |
| ==UNILATERAL USE OF FORCE==
| |
|
| |
| ===Self-Defense and Reprisal===
| |
|
| |
| ===Preemptive Self-Defense===
| |
|
| |
| ===Addressing New Threats: Syria, the Islamic State, and Iran===
| |
|
| |
|
| |
| ===Rescue===
| |
|
| |
|
| |
| ==TARGETING TERRORISTS==
| |
|
| |
| ===Targeted Killing by the United States After 9/11===
| |
|
| |
| ===Targeted Killing and Human Rights Law (HRL)===
| |
|
| |
| ===Targeted Killing and International Humanitarian Law (IHL)===
| |
|
| |
|
| |
| ===U.S. Law and the Targeting of U.S. Citizens===
| |
|
| |
|
| |
| ==CYBER OPERATIONS==
| |
|
| |
| ===Assessing the Risk of Cyber Warfare===
| |
|
| |
|
| |
| ===Applying International Law to Cyber Operations===
| |
|
| |
|
| |
| ===Applying Domestic Law to Cyber Operations===
| |
|
| |
|
| |
| ===Cyber War of Ideas===
| |
|
| |
|
| |
| ==NUCLEAR WAR==
| |
|
| |
|
| |
| ===The Nature and Effects of Nuclear Weapons===
| |
|
| |
| ===International Law of Nuclear Weapons===
| |
|
| |
|
| |
| ===Domestic Law of Nuclear Weapons===
| |
|
| |
|
| |
| ==HUMANITARIAN AND PEACE OPERATIONS==
| |
|
| |
| ===Authority for Peaceful Deployments===
| |
|
| |
|
| |
| ===Crossing the Mogadishu Line: Good Intentions Gone Terribly Wrong===
| |
|
| |
| ===Humanitarian Intervention in Libya — 2011===
| |
|
| |
|
| |
| ==INTRODUCING INTELLIGENCE==
| |
|
| |
|
| |
| ===The Intelligence Cycle===
| |
|
| |
|
| |
| ===How Is Intelligence Collected? — The “INTS”===
| |
|
| |
| ===Covert Actions===
| |
|
| |
|
| |
| ==THE INTELLIGENCE COMMUNITY: ORGANIZATION AND AUTHORITY==
| |
|
| |
|
| |
| ===Authority for Intelligence Activities===
| |
|
| |
|
| |
| ===Funding and Managing the Intelligence Community===
| |
|
| |
| ===Coordination and Sharing of Intelligence===
| |
|
| |
| ==COVERT OPERATIONS==
| |
|
| |
| ===Curtailing Private Actions===
| |
|
| |
| ===Early CIA Covert Operations===
| |
|
| |
| ===CIA Operations and Congressional Oversight===
| |
|
| |
| ===The Iran-Contra Affair===
| |
|
| |
| ===Continuing Oversight Reforms===
| |
|
| |
| ===Special Military Operations===
| |
|
| |
| ===Outsourcing Secret War===
| |
|
| |
|
| |
| ==THE FOURTH AMENDMENT AND NATIONAL SECURITY==
| |
|
| |
| ===The Fourth Amendment Framework===
| |
|
| |
| ===A National Security Exception?===
| |
|
| |
| === A Foreign Intelligence Exception?===
| |
|
| |
| ===Surveillance Abroad===
| |
|
| |
|
| |
| ==CONGRESSIONAL AUTHORITY FOR FOREIGN INTELLIGENCE SURVEILLANCE==
| |
|
| |
|
| |
| ===The Foreign Intelligence Surveillance Act: Core Requirements===
| |
|
| |
| ===FISA, Law Enforcement, and the Fourth Amendment===
| |
|
| |
|
| |
| ===FISA Trends===
| |
|
| |
|
| |
| ==PROGRAMMATIC ELECTRONIC SURVEILLANCE FOR FOREIGN INTELLIGENCE==
| |
|
| |
|
| |
| ===Case Study: The Terrorist Surveillance Program===
| |
|
| |
| ===The FISA Amendments Act and the Future of Programmatic Surveillance===
| |
|
| |
| ==THE THIRD-PARTY DOCTRINE: ORIGINS AND APPLICATIONS==
| |
|
| |
| ===Origins of the Third-Party Doctrine===
| |
|
| |
| ===Applications of the Third-Party Doctrine===
| |
|
| |
|
| |
| ==THE COLLECTION AND USE OF THIRD-PARTY RECORDS==
| |
|
| |
| ===Targeted Collection of Third-Party Records===
| |
|
| |
| ===Bulk Collection of Third-Party Records===
| |
|
| |
| ===Data Mining===
| |
|
| |
| ==SCREENING FOR SECURITY==
| |
|
| |
| ===Checkpoint Searches===
| |
|
| |
| ===Watch Listing===
| |
|
| |
| ==PROFILING AND TRAVEL BANS==
| |
|
| |
| ===Profiling===
| |
|
| |
| ===The Trump Administration Travel Bans===
| |
|
| |
| ==HABEAS CORPUS: THE STRUCTURE OF THE SUSPENSION CLAUSE==
| |
|
| |
| ===The Origins of the Suspension Clause===
| |
|
| |
| ===The Habeas Corpus Statute(s)===
| |
|
| |
|
| |
| ===Suspending the Writ===
| |
|
| |
| ===The Effects of a Valid Suspension===
| |
|
| |
| ==HABEAS CORPUS: THE SCOPE OF THE SUSPENSION CLAUSE==
| |
|
| |
| ===Geographic Scope of the Suspension Clause===
| |
|
| |
| ===Review Required by the Suspension Clause===
| |
|
| |
| ==MILITARY DETENTION OF U.S. PERSONS==
| |
|
| |
| ===The Internment Camps and the Non-Detention Act===
| |
|
| |
|
| |
| ===Military Detention of U.S. Persons Captured Overseas===
| |
|
| |
| ===Military Detention of U.S. Persons Captured in the United States===
| |
|
| |
| ===Codification of Military Detention===
| |
|
| |
| ==MILITARY DETENTION OF NON-U.S. PERSONS==
| |
|
| |
|
| |
| ===Substantive Authority to Detain Non-U.S. Persons===
| |
|
| |
|
| |
| ===The Process for Proving Detainability===
| |
|
| |
|
| |
| ===The Next Generation of Guantánamo Litigation===
| |
|
| |
| ===“Closing” Guantánamo===
| |
|
| |
| ==PREVENTIVE DETENTION==
| |
|
| |
| ===Constitutional Limits on Preventive Detention===
| |
|
| |
|
| |
| ===“Spitting on the Sidewalk”: Pretextual(?) Criminal Detention===
| |
|
| |
|
| |
| ===The Post-9/11 Roundup of “High Interest” Detainees===
| |
|
| |
|
| |
| ===Material Witness Detentions===
| |
|
| |
|
| |
| ==INTERROGATING TERRORIST SUSPECTS==
| |
|
| |
| ===When Is Interrogation Torture?===
| |
|
| |
| ===The Legal Standards and their Application===
| |
|
| |
| ==CASE STUDY OF COERCIVE INTERROGATION OF DETAINEES IN U.S. CUSTODY AFTER 9/11==
| |
|
| |
| ===The Evolving History of U.S. Interrogation of Suspected 997
| |
| Terrorists===
| |
|
| |
| ===Applying the Interrogation Laws===
| |
|
| |
| == CRIMINALIZING TERRORISM AND ITS PRECURSORS==
| |
|
| |
| ===“Boom” Terrorist Crimes===
| |
|
| |
| ===“Left of Boom” (Precursor) Crimes===
| |
|
| |
| ===Treason===
| |
|
| |
|
| |
| ===The Long Arm of the Law: Extraterritorial Criminal Jurisdiction===
| |
|
| |
|
| |
| ==TERRORISM TRIALS: PROCEDURE AND EVIDENCE==
| |
|
| |
| ===National Security Criminal Procedure: Miranda, Presentment, and Speedy Trial===
| |
|
| |
| ===Coerced Evidence===
| |
|
| |
| ===Secret Evidence===
| |
|
| |
| ===Access to Secret Exculpatory Testimony===
| |
|
| |
|
| |
| ===Do We Need a National Security Court?===
| |
|
| |
| ==TRIAL BY MILITARY COMMISSION==
| |
|
| |
| ===Trial by Military Commission Before 9/11===
| |
|
| |
| ===Trial by Military Commission After 9/11: The First Phase===
| |
|
| |
|
| |
| ===Military Commissions After Hamdan===
| |
|
| |
| ==HOMELAND SECURITY==
| |
|
| |
| ===Worst-Case Scenario: A Plague on Your City===
| |
|
| |
| ===The Federal Response Role===
| |
|
| |
| ===First Responders: State and Local Responses===
| |
|
| |
| ===Responding to Biological Threats 1175 Case Study: The 2014 Ebola Virus Epidemic===
| |
|
| |
| ==THE MILITARY’S DOMESTIC ROLE==
| |
|
| |
| ===The Traditional Role of the Military in American Society===
| |
|
| |
|
| |
| ===Domestic Military Intelligence Collection===
| |
|
| |
| ===The Military’s Role in Responding to Domestic Emergencies===
| |
|
| |
|
| |
| ===Martial Law: When Planning Fails===
| |
|
| |
| ==SAFEGUARDING NATIONAL SECURITY INFORMATION==
| |
|
| |
| ===Balancing Secrecy, Security, and Self-Determination===
| |
|
| |
| ===Classification of National Security Information===
| |
|
| |
| ===Restricting Access to Sensitive Information: Security Clearances===
| |
|
| |
|
| |
| ===Criminal Prosecution of Leakers: The Espionage Act===
| |
|
| |
|
| |
| ===“Authorized” Leaks===
| |
|
| |
| ==ACCESS TO NATIONAL SECURITY INFORMATION==
| |
|
| |
| ===The Freedom of Information Act===
| |
|
| |
| ===Other Open Government Laws===
| |
|
| |
| ===Non-Statutory Rights of Access===
| |
|
| |
|
| |
| ===Congress’s Right of Access===
| |
|
| |
| ==CENSORSHIP==
| |
|
| |
| ===Fundamentals of Censorship: The Pentagon Papers Case===
| |
|
| |
| ===Wikileaks: The New New York Times?===
| |
|
| |
| ===Publication as a Crime?===
| |
|
| |
| ===Shooting the Messenger’s Messenger?===
| |